The penalty for privacy violations: How privacy violations impact trust online

被引:89
|
作者
Martin, Kirsten [1 ]
机构
[1] George Washington Univ, Strateg Management & Publ Policy, Sch Business, Washington, DC 20052 USA
基金
美国国家科学基金会;
关键词
Privacy; Online trust; Trust factors; Website trust; E-commerce; INFORMATION PRIVACY; ELECTRONIC COMMERCE; FACTORIAL SURVEYS; SCALE DEVELOPMENT; INTEGRATED MODEL; CONSUMER TRUST; WEB; SECURITY; USERS; RISK;
D O I
10.1016/j.jbusres.2017.08.034
中图分类号
F [经济];
学科分类号
02 ;
摘要
With information misuse as a particularly salient form of risk online, respecting privacy is often closely tied to trust in consumer surveys. This study uses factorial vignette survey methodology to measure the relative importance of violating privacy expectations to consumers' trust in a website. The findings suggest consumers find violations of privacy expectations, specifically the secondary uses of information, to diminish trust in a website. Firms that violate privacy expectations are penalized twice: violations of privacy (1) impact trust directly and (2) diminish the importance of trust factors such as integrity and ability on trust. In addition, consumers with greater technology savvy place greater importance on privacy factors than respondents with less knowledge. Violations of privacy may place firms in a downward trust spiral by decreasing not only trust in the website but also the impact of possible mechanisms to rebuild trust such as a firm's integrity and ability.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
  • [21] Complexity of exploiting privacy violations in strategic argumentation
    Maher, Michael J., 1600, Springer Verlag (8862):
  • [22] Avoiding Violations of Patient Privacy With Social Media
    Melnik, Tatiana
    JOURNAL OF NURSING REGULATION, 2013, 3 (04) : 39 - 44
  • [23] Detecting privacy violations in sensitive XML databases
    Böttcher, S
    Steinmetz, R
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 143 - 154
  • [24] Privacy Violations of Video Communications in a Ubiquitous Environment
    Sakakibara, Ken
    Higa, Kunihiko
    THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 205 - 211
  • [25] Automatic Detection for Privacy Violations in Android Applications
    Luo, Qian
    Yu, Yinbo
    Liu, Jiajia
    Benslimane, Abderrahim
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6159 - 6172
  • [26] Moving violations: Data privacy in public transit
    Obermeyer, Nancy J.
    GEOGRAPHICAL REVIEW, 2007, 97 (03) : 351 - 364
  • [27] Understanding Privacy Violations in Big Data Systems
    Shamsi, Jawwad A.
    Khojaye, Muhammad Ali
    IT PROFESSIONAL, 2018, 20 (03) : 73 - 81
  • [28] Complexity of Exploiting Privacy Violations in Strategic Argumentation
    Maher, Michael J.
    PRICAI 2014: TRENDS IN ARTIFICIAL INTELLIGENCE, 2014, 8862 : 523 - 535
  • [29] HOW DO VIOLATIONS OF PRIVACY AND MORAL AUTONOMY THREATEN THE BASIS OF OUR DEMOCRACY?
    Laas-Mikko, Katrin
    Sutrop, Margit
    TRAMES-JOURNAL OF THE HUMANITIES AND SOCIAL SCIENCES, 2012, 16 (04): : 369 - 381
  • [30] Framing Google. The representation of online privacy violations in NRC Handelsblad and De Correspondent
    Knuvers, Judith
    Malliet, Steven
    Maeseele, Pieter
    TIJDSCHRIFT VOOR COMMUNICATIEWETENSCHAP, 2018, 46 (04): : 350 - +